NIST Issues Guidance for Medical IoT Device Security

NIST Issues Guidance for Medical IoT Device Security

As the popularity of medical IoT devices grows, so do security vulnerabilities. There are more connected devices than there are humans on Earth. Organizations have been as quick to embrace the Internet of Things as consumers have, and the healthcare industry is no exception. Medical IoT devices have exploded in ... Read More
Penetration Tests vs. Vulnerability Scans: Understanding the Differences

Penetration Tests vs. Vulnerability Scans: Understanding the Differences

Penetration tests and vulnerability scans are related but different cyber security services The difference between penetration tests and vulnerability scans is a common source of confusion. While both are important tools for cyber risk analysis and are mandated under PCI DSS, HIPAA, and other security standards and frameworks, they are ... Read More
Cyber Security Lesson Brief from the Under Armour Breach

Cyber Security Lesson Brief from the Under Armour Breach

The Under Armour breach provides lessons in the do’s and don’ts of enterprise cyber security and compliance with the EU GDPR Last week, athletic apparel manufacturer Under Armour announced that its popular MyFitnessPal weight loss and fitness tracking app had been hacked, compromising 150 million accounts. The Under Armour breach ... Read More
This Year's Crop of Tax Phishing Scams Target Individuals, Employers, and Tax Preparers

Tax Phishing Scams Are Back: Here Are 3 to Watch Out For

This Year’s Crop of Tax Phishing Scams Target Individuals, Employers, and Tax Preparers Tax season is stressful enough without having to worry about becoming the victim of a cyber crime. Here are three different tax phishing scams targeting employers, individuals, and even tax preparers that are currently making the rounds ... Read More
Two new reports illustrate the threat of employee carelessness and maliciousness to healthcare data security

Employees Are Biggest Threat to Healthcare Data Security

Two new reports illustrate the threat of employee carelessness and maliciousness to healthcare data security Healthcare data security is under attack from the inside. While insider threats – due to employee error, carelessness, or malicious intent – are a problem in every industry, they are a particular pox on healthcare ... Read More
#MeToo Prompts Employers to Review their Anti-Harassment Policies

#MeToo Prompts Employers to Review their Anti-Harassment Policies

Comprehensive anti-harassment policies are even more important in light of #MeToo movement The #MeToo movement, which was birthed in the wake of sexual abuse allegations against Hollywood mogul Harvey Weinstein, has shined a spotlight on the epidemic of sexual harassment and discrimination in the U.S. According to a nationwide survey ... Read More
Mueller indictments of Russian cyber criminals put election hacking at top of mind

States Worry About Election Hacking as Midterms Approach

Mueller indictments of Russian cyber criminals put election hacking at top of mind State officials expressed grave concerns about election hacking the day after Special Counsel Robert Mueller handed down indictments of 13 Russian nationals on charges of interfering with the 2016 presidential election. The Washington Post reports: At a ... Read More
Crypto-Mining Malware May Be a Bigger Threat than Ransomware

Crypto-Mining Malware May Be a Bigger Threat than Ransomware

Crypto-Mining Malware is Crippling Enterprise Networks Cryptocurrencies such as Bitcoin and Ethereum have gone mainstream; it seems like everybody and their brother is looking to buy some crypto and get their piece of the digital currency gold rush. Hackers want a piece of it, too. In addition to hacking ICO’s ... Read More

CUTV News Radio spotlights Michael Peters of Lazarus Alliance

CUTV News Radio spotlights Michael Peters of Lazarus AllianceCUTV News Radio with veteran award-winning broadcast TV and radio hosts/media personalities Jim Masters and Doug Llewelyn is an exciting, informative, entertaining, thought-provoking and empowering broadcast series featuring several LIVE episodes daily and is a service of the Telly-award winning CUTV News, ... Read More
Post Equifax, New Data Breach Notification Laws are Inevitable

Post Equifax, New Data Breach Notification Laws are Inevitable

New data breach notification regulations aren’t a matter of if, but when The U.S. Securities and Exchange Commission plans to update its six-year-old guidelines regarding data breach notification and cyber risk disclosure, Bank Info Security reports: The agency has indicated that it expects to refine guidance around how businesses disclose ... Read More
Loading...